Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Internet (35)
- Privacy (30)
- SSRN (15)
- Technology (13)
- Copyright (10)
-
- First Amendment (10)
- Artificial intelligence (9)
- Copyright law (9)
- Data (9)
- Cyberlaw (8)
- Section 230 (7)
- Surveillance (7)
- Telecommunications (7)
- Information privacy (6)
- Regulation (6)
- Cybersecurity (5)
- Cyberspace (5)
- Discrimination (5)
- Free expression (5)
- Free speech (5)
- Internet law (5)
- Law (5)
- Network neutrality (5)
- Social media (5)
- Transparency (5)
- Automation (4)
- Broadband (4)
- Columbia Law Review (4)
- Consumer protection (4)
- Contracts (4)
- Publication Year
Articles 31 - 60 of 248
Full-Text Articles in Law
National Cybersecurity Innovation, Tabrez Y. Ebrahim
National Cybersecurity Innovation, Tabrez Y. Ebrahim
Faculty Scholarship
National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature …
Cyber Mobs, Disinformation, And Death Videos: The Internet As It Is (And As It Should Be), Danielle K. Citron
Cyber Mobs, Disinformation, And Death Videos: The Internet As It Is (And As It Should Be), Danielle K. Citron
Faculty Scholarship
Fiction and visual representations can alter our understanding of human experiences and struggles. They help us understand human frailties and suffering in a visceral way. Nick Drnaso’s graphic novel Sabrina does that in spades. In Sabrina, a woman is murdered by a misogynist, and a video of her execution is leaked. Conspiracy theorists deem her murder a hoax. A cyber mob smears the woman’s loved ones as crisis actors, posts death threats, and spreads their personal information. The attacks continue until a shooting massacre redirects the cyber mob’s wrath to other mourners. Sabrina captures the breathtaking velocity of disinformation online …
Nascent Competitors, C. Scott Hemphill, Tim Wu
Nascent Competitors, C. Scott Hemphill, Tim Wu
Faculty Scholarship
A nascent competitor is a firm whose prospective innovation represents a serious threat to an incumbent. Protecting such competition is a critical mission for antitrust law, given the outsized role of unproven outsiders as innovators and the uniquely potent threat they often pose to powerful entrenched firms. In this Article, we identify nascent competition as a distinct analytical category and outline a program of antitrust enforcement to protect it. We make the case for enforcement even where the ultimate competitive significance of the target is uncertain, and explain why a contrary view is mistaken as a matter of policy and …
The Promise And Limits Of Cyber Power In International Law: Remarks, Monica Hakimi, Ann Väljataga, Zhixiong Huang, Charles Allen, Sue Robertson, Doug Wilson
The Promise And Limits Of Cyber Power In International Law: Remarks, Monica Hakimi, Ann Väljataga, Zhixiong Huang, Charles Allen, Sue Robertson, Doug Wilson
Faculty Scholarship
Hi, everyone. I am Monica Hakimi from the University of Michigan Law School, and I would like to welcome you to our panel on cyber power and its limits. The topic almost does not need an introduction. We all know just from reading the news that our collective dependence on cyberspace is also a huge vulnerability, and state and non-state actors exploit this vulnerability to do one another harm. They use cyber technologies not just to spy on one another, but also, for example, to interfere in national elections, to steal trade secrets or other valuable information, to disrupt the …
Cyberattacks And The Constitution, Matthew C. Waxman
Cyberattacks And The Constitution, Matthew C. Waxman
Faculty Scholarship
Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.
Transparency After Carpenter, Hannah Bloch-Wehba
Transparency After Carpenter, Hannah Bloch-Wehba
Faculty Scholarship
This brief invited response to Professor Matthew Tokson’s Foulston-Siefkin lecture on the Supreme Court's decision in Carpenter v. United States makes two contributions. First, I highlight the social, political, and economic factors at play in the Carpenter decision. The Carpenter Court recognized, in particular, that digital surveillance implicates the rights of more than just criminal suspects: it poses unique and unappreciated threats to public governance of policing. The decision, I argue, reflects longstanding preoccupations in Fourth Amendment decisions with protecting the “public” — particularly innocent third parties — from intrusive and baseless investigations. In so doing, I situate Professor Tokson’s …
A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg
A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg
Faculty Scholarship
To a US appraiser, article 17 of the Digital Single Market Directive suggests the EU has learned from American mistakes (and from its own) in the allocation of internet intermediaries’ liability for hosting and communicating user-posted content. Before the DSM Directive, art. 14 of the 2000 eCommerce Directive set out a notice-and-takedown system very similar to the regime provided in 17 U.S.C. section 512(c). Both regimes replaced the normal copyright default, which requires authorization to exploit works, with a limitation on the liability of service providers who complied with statutory prerequisites. Because the limitation ensured that service providers would not …
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Faculty Scholarship
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …
Online Legal Document Providers And The Public Interest: Using A Certification Approach To Balance Access To Justice And Public Protection, Susan Saab Fortney
Online Legal Document Providers And The Public Interest: Using A Certification Approach To Balance Access To Justice And Public Protection, Susan Saab Fortney
Faculty Scholarship
The Internet and electronic communications have revolutionized how consumers obtain legal information and assistance. The availability of legal forms and services has developed at lightning speed and countless consumers are using these forms, rather than consulting attorneys. At the same time, many regulators of the legal profession appear to be frozen in time. Some take the position that the provision of interactive forms amounts to the unauthorized practice of law and others question arrangements that appear to involve the sharing of legal fees with non-lawyers. Even for those interested in regulating the provision of on-line services, one complication to doing …
Sexual Privacy, Danielle K. Citron
Sexual Privacy, Danielle K. Citron
Faculty Scholarship
Those who wish to control, expose, and damage the identities of individuals routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms and “up their skirts.” Such images are used to coerce people into sharing nude photographs and filming sex acts under the threat of public disclosure. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.
Each of these abuses is an invasion of sexual privacy—the behaviors, expectations, and choices that manage access to and information about …
When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney
When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney
Faculty Scholarship
A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …
A Hater's Guide To Geoblocking, Peter K. Yu
A Hater's Guide To Geoblocking, Peter K. Yu
Faculty Scholarship
Geoblocking restricts access to online content based on the user's geographical location. Territorially based access control is strongly disliked, if not passionately hated, by those who travel abroad frequently as well as those who consume a considerable amount of foreign content. While the past has seen the use of geoblocking as technological self-help, such a technique has now received growing support from policymakers and judges.
Commissioned for a symposium on "Intellectual Property in a Globalized Economy: United States Extraterritoriality in International Business," this article begins by briefly recounting five sets of arguments against geoblocking. The article then draws on the …
Intermediaries And Private Speech Regulation: A Transatlantic Dialogue - Workshop Report, Tiffany Li
Intermediaries And Private Speech Regulation: A Transatlantic Dialogue - Workshop Report, Tiffany Li
Faculty Scholarship
The Wikimedia/Yale Law School Initiative on Intermediaries and Information (WIII) at Yale Law School has released a comprehensive report synthesizing key insights from intermediary liability and online speech and expression experts in Europe and the United States.
The report focuses on the critical but complicated issue of private speech regulation on the internet and the connections between platform liability laws and fundamental rights, including free expression. The report reflects discussions held at “Intermediaries & Private Speech Regulation: A Transatlantic Dialogue,” an invitation-only workshop convened by WIII, featuring leading internet law experts from the United States and Europe.
This report highlights …
Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley
Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley
Faculty Scholarship
Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results …
The Good, The Bad, And The Ugly Of Online Reviews: The Trouble With Trolls And A Role For Contract Law After The Consumer Review Fairness Act, Wayne Barnes
Faculty Scholarship
The advent of the Internet has brought innumerable innovations to our lives. Among the innovations is the meteoric rise in the volume of e-commerce conducted on the Internet. Correspondingly, consumer-posted information about merchants, goods, and services has also begun to be a rich source of information for consumers researching a purchase online. This information takes many forms, but a major category is the narrative review describing the purchase and experience. Such reviews are posted on websites such as Yelp, Amazon and TripAdvisor, on apps, and on social media such as Facebook and Twitter. The amount and volume of reviews has …
Introduction To The Symposium On Cyber Attribution, Monica Hakimi
Introduction To The Symposium On Cyber Attribution, Monica Hakimi
Faculty Scholarship
This symposium explores some of the legal issues surrounding the attribution of cyber conduct to states. Relative to states’ other activities, cyber conduct poses particularly thorny attribution challenges. States that engage in such conduct often use technology to obscure their identities or the full effects of their operations. The attribution challenges in turn raise difficult questions about how victim states should be allowed to respond — whether in kind, with other retorsions or countermeasures, with kinetic force, or by doing nothing at all. For example, how confident must a victim state be that it has correctly identified the source of …
The Problem Isn't Just Backpage: Revising Section 230 Immunity, Danielle K. Citron, Benjamin Wittes
The Problem Isn't Just Backpage: Revising Section 230 Immunity, Danielle K. Citron, Benjamin Wittes
Faculty Scholarship
Backpage is a classifieds hub that hosts “80 percent of the online advertising for illegal commercial sex in the United States.” This is not by happenstance but rather by design. Evidence suggests that the advertising hub selectively removed postings discouraging sex trafficking. The site also tailored its rules to protect the practice from detection, including allowing anonymized email and photographs stripped of metadata. Under the prevailing interpretation of 47 U.S.C. § 230 (“Section 230”) of the CDA, however, Backpage would be immune from liability connected to sex trafficking even though it proactively helped sex traffickers from getting caught. No matter …
Consumer Bitcredit And Fintech Lending, Christopher K. Odinet
Consumer Bitcredit And Fintech Lending, Christopher K. Odinet
Faculty Scholarship
The digital economy is changing everything, including how we borrow money. In the wake of the 2008 crisis, banks pulled back in their lending and, as a result, many consumers and small businesses found themselves unable to access credit. A wave of online firms called fintech lenders have filled the space left vacant by traditional financial institutions. These platforms are fast making antiques out of many mainstream lending practices, such as long paper applications and face-to-face meetings. Instead, through underwriting by automation — utilizing big data (including social media data) and machine learning — loan processing that once took days …
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Faculty Scholarship
To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …
Zappers, Phantomware And Other Sales Suppression Software In The State Of Washington, Richard Thompson Ainsworth, Robert Chicoine
Zappers, Phantomware And Other Sales Suppression Software In The State Of Washington, Richard Thompson Ainsworth, Robert Chicoine
Faculty Scholarship
Electronic sales suppression (ESS) is a fraud that has been a (prominent) feature of the North American retail business since at least 1996. The first EES case in the US dates from 1981. ESS is a global problem. Depending on the jurisdiction, and the research study consulted, ESS is estimated to be present in 34% (of Canadian), 50% (of German – two studies), and 70% (of Swedish and Slovenian) businesses. It may be the case today, that “you cannot leave home without” encountering (or participating in) ESS.
The most common types of sales suppression technology are Zappers and Phantomware programming. …
Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove
Risk And Anxiety: A Theory Of Data Breach Harms, Danielle K. Citron, Daniel Solove
Faculty Scholarship
In lawsuits about data breaches, the issue of harm has confounded courts. Harm is central to whether plaintiffs have standing to sue in federal court and whether their claims are viable. Plaintiffs have argued that data breaches create a risk of future injury from identity theft or fraud and that breaches cause them to experience anxiety about this risk. Courts have been reaching wildly inconsistent conclusions on the issue of harm, with most courts dismissing data breach lawsuits for failure to allege harm. A sound and principled approach to harm has yet to emerge, resulting in a lack of consensus …
"Fake News," No News, And The Needs Of Local Communities, Carol Pauli
"Fake News," No News, And The Needs Of Local Communities, Carol Pauli
Faculty Scholarship
The Quaker authors had in mind an ancient truth - that "love endures and overcomes" - and they were convinced that this truth is accessible to all. This article addresses truth at a more immediate and mundane level. It is concerned with the accurate information that local communities need in order to thrive.
The article proceeds in three steps. Part I reviews one way community needs were addressed when the first large-scale electronic communication technology entered individual homes in the form of radio and television. In those days, broadcasters had an affirmative duty to ascertain the problems of the communities …
Exposing Secret Searches: A First Amendment Right Of Access To Electronic Surveillance Orders, Hannah Bloch-Wehba
Exposing Secret Searches: A First Amendment Right Of Access To Electronic Surveillance Orders, Hannah Bloch-Wehba
Faculty Scholarship
Although, as a rule, court proceedings and judicial records are presumptively open to the public, electronic surveillance documents are exceptions. Like ordinary search warrants, surveillance applications are considered ex parte. But court orders frequently remain sealed indefinitely, even when there is no basis for continued secrecy. Indeed, secrecy — in the form of gag orders, local judicial rules, and even clerical filing and docketing practices — is built into the laws that regulate electronic surveillance.
This Article argues that this widespread secrecy violates the First Amendment right of access to court proceedings and documents. The history of search and seizure …
Beyond Intermediary Liability: The Future Of Information Platforms - Workshop Report, Tiffany Li
Beyond Intermediary Liability: The Future Of Information Platforms - Workshop Report, Tiffany Li
Faculty Scholarship
On February 13, 2018, WIII hosted the workshop, “Beyond Intermediary Liability: The Future of Information Platforms.” Leading experts from industry, civil society, and academia convened at Yale Law School for a series of non-public, guided discussions. The roundtable of experts considered pressing questions related to intermediary liability and the rights, roles, and responsibilities of information platforms in society. Based on conversations from the workshop, WIII published a free, publicly available report detailing the most critical issues necessary for understanding the role of information platforms, such as Facebook and Google, in law and society today. The report highlights insights and questions …
Sexual Privacy, Danielle Keats Citron
Sexual Privacy, Danielle Keats Citron
Faculty Scholarship
Those who wish to control and expose the identities of women and people from marginalized communities routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms, and “up their skirts.” They are coerced into sharing nude photographs and filming sex acts under the threat of public disclosure of their nude images. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.
At the heart of these abuses is an invasion of sexual privacy—the behaviors and expectations that manage …
Prediction, Persuasion, And The Jurisprudence Of Behaviorism, Frank A. Pasquale, Glyn Cashwell
Prediction, Persuasion, And The Jurisprudence Of Behaviorism, Frank A. Pasquale, Glyn Cashwell
Faculty Scholarship
No abstract provided.
Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards
Four Principles For Digital Expression (You Won't Believe #3!), Danielle K. Citron, Neil Richards
Faculty Scholarship
At the dawn of the Internet’s emergence, the Supreme Court rhapsodized about its potential as a tool for free expression and political liberation. In ACLU v. Reno (1997), the Supreme Court adopted a bold vision of Internet expression to strike down a federal law - the Communications Decency Act - that restricted digital expression to forms that were merely “decent.” Far more than the printing press, the Court explained, the mid-90s Internet enabled anyone to become a town crier. Communication no longer required the permission of powerful entities. With a network connection, the powerless had as much luck reaching a …
Race And Rights In The Digital Age, Catherine Powell
Race And Rights In The Digital Age, Catherine Powell
Faculty Scholarship
No abstract provided.
Twenty Years Of Web Scraping And The Computer Fraud And Abuse Act, Andrew Sellars
Twenty Years Of Web Scraping And The Computer Fraud And Abuse Act, Andrew Sellars
Faculty Scholarship
"Web scraping" is a ubiquitous technique for extracting data from the World Wide Web, done through a computer script that will send tailored queries to websites to retrieve specific pieces of content. The technique has proliferated under the ever-expanding shadow of the Computer Fraud and Abuse Act (CFAA), which, among other things, prohibits obtaining information from a computer by accessing the computer without authorization or exceeding one's authorized access.
Unsurprisingly, many litigants have now turned to the CFAA in attempt to police against unwanted web scraping. Yet despite the rise in both web scraping and lawsuits about web scraping, practical …
Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle K. Citron
Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle K. Citron
Faculty Scholarship
Silicon Valley has long been viewed as a full-throated champion of First Amendment values. The dominant online platforms, however, have recently adopted speech policies and processes that depart from the U.S. model. In an agreement with the European Commission, tech companies have pledged to respond to reports of hate speech within twenty-four hours, a hasty process that may trade valuable expression for speedy results. Plans have been announced for an industry database that will allow the same companies to share hashed images of banned extremist content for review and removal elsewhere.
These changes are less the result of voluntary market …